Professional Documents
Culture Documents
Povezanost Objekata Na Internetu: 1. Poglavlje: Ciljevi
Povezanost Objekata Na Internetu: 1. Poglavlje: Ciljevi
Povezanost Objekata Na Internetu: 1. Poglavlje: Ciljevi
na internetu
Uvod u mreže
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
1. poglavlje: Ciljevi
Polaznici će naučiti:
Objasniti primjenu višestrukih mreža u svakodnevnom
životu.
Objasniti topologije i uređaje koji se rabe u maloj i
srednjoj poslovnoj mreži.
Objasniti osnovne značajke mreže koja podržava
komunikaciju u malim i srednjim poduzećima.
Objasniti trendove umrežavanja koji utječu na primjenu
mreža u malim i srednjim poduzećima.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
Umrežavanje danas
Mreže nekad i danas
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Komponente mreže
Mrežni infrastrukturni uređaji
Posrednički mrežni uređaji su:
uređaji za pristup mreži (preklopnici i bežične pristupne točke)
uređaji za umrežavanje (usmjernici)
sigurnosni uređaji (vatrozidi)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Komponente mreže
Simboli za prikaz komponenti mreže
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Internet
Intranet i ekstranet
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
Povezivanje s Internetom
Povezivanje udaljenih korisnika s Internetom
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
Konvergirane mreže
Konvergiranje mreže
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
Pouzdana mreža
Kvalitetna mrežna arhitektura
S razvojem mreža otkrivamo da postoje četiri osnovne
karakteristike arhitekture koje trebaju biti ispunjene da bi se
očekivanja korisnika zadovoljila:
Otpornost na pogreške
Skalabilnost
Kvaliteta usluge (QoS)
Sigurnost
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
Pouzdana mreža
Mreže s komutacijom paketa
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Pouzdana mreža
Davanje usluga (QoS)
Primjer postavljanja prioriteta unutar neke organizacije:
Komunikacija u realnom vremenu - Veći se prioritet daje
uslugama kao što je telefonija ili distribucija videosadržaja.
Komunikacija koja se ne prenosi u realnom vremenu - Manji
se prioritet daje dohvaćanju web stranica ili e-pošte.
Od velike važnosti za organizaciju - Veći se prioritet daje
kontroli proizvodnih procesa ili podatcima o poslovnim
transakcijama.
Neželjena komunikacija - Smanjuje se prioritet ili se blokiraju
neželjene aktivnosti, kao što je dijeljenje datoteka u P2P mreži
ili prijenos zabavnih sadržaja uživo.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
Sigurnost mreže
Prijetnje sigurnosti
Najčešći oblici vanjskih prijetnji sigurnosti mreže su:
Virusi, crvi i trojanci
Špijunski i oglašivački softver
Napad na nulti dan, ili u nulti sat
Hakerski napadi
DoS napadi (uskraćivanje usluge)
Presretanje i krađa podataka
Krađa identiteta
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43
Arhitekture mreža
Cisco arthitekture mreža
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48